Page 3 of 11 results (0.002 seconds)

CVSS: 10.0EPSS: 23%CPEs: 50EXPL: 0

Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840. Múltiples desbordamiento de búfer basados en memoria dinámica en la función readPostBody en cgiutil.c de mapserv en MapServer v4.x hasta v4.10.4 y v5.x anteriores a v5.4.2, permite a atacantes remotos ejecutar código de su elección a través de (1) una cabecera de HTTP "Content-Length" manipulada o (2) una petición HTTP larga, relacionado con un desbordamiento de entero que provoca una desbordamiento de búfer basado en memoria dinámica. NOTA: Esta vulnerabilidad existe por un corrección incompleta de CVE-2009-0840. • http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT http://trac.osgeo.org/mapserver/ticket/2943 http://www.debian.org/security/2009/dsa-1914 http://www.openwall.com/lists/oss-security/2009/07/01/1 http://www.openwall.com/lists/oss-security/2009/07/01&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •